{"id":"https://openalex.org/W6913194735","doi":"https://doi.org/10.5555/3398761.3398770","title":"Formal Verification of Neural Agents in Non-deterministic Environments","display_name":"Formal Verification of Neural Agents in Non-deterministic Environments","publication_year":2020,"publication_date":"2020-05-09","ids":{"openalex":"https://openalex.org/W6913194735","doi":"https://doi.org/10.5555/3398761.3398770"},"language":"en","primary_location":{"id":"pmh:oai:kar.kent.ac.uk:90814","is_oa":false,"landing_page_url":"https://kar.kent.ac.uk/90814/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or workshop item"},"type":"other","indexed_in":[],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Akintunde, Michael E.","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Akintunde, Michael E.","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Kouvaros, Panagiotis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kouvaros, Panagiotis","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Lomuscio, Alessio","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lomuscio, Alessio","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8898000121116638,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8898000121116638,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.06030000001192093,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.013199999928474426,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.6881999969482422},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.6606000065803528},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6564000248908997},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.6492000222206116},{"id":"https://openalex.org/keywords/fragment","display_name":"Fragment (logic)","score":0.5889000296592712},{"id":"https://openalex.org/keywords/runtime-verification","display_name":"Runtime verification","score":0.4982999861240387},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4180999994277954},{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.41690000891685486}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7479000091552734},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.6881999969482422},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.6606000065803528},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6564000248908997},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.6492000222206116},{"id":"https://openalex.org/C2776235265","wikidata":"https://www.wikidata.org/wiki/Q18392052","display_name":"Fragment (logic)","level":2,"score":0.5889000296592712},{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.4982999861240387},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4311999976634979},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4180999994277954},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.41690000891685486},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4142000079154968},{"id":"https://openalex.org/C2777669093","wikidata":"https://www.wikidata.org/wiki/Q17141570","display_name":"Reachability problem","level":3,"score":0.4106000065803528},{"id":"https://openalex.org/C147969180","wikidata":"https://www.wikidata.org/wiki/Q5014579","display_name":"CTL*","level":4,"score":0.3880000114440918},{"id":"https://openalex.org/C198008173","wikidata":"https://www.wikidata.org/wiki/Q1040040","display_name":"Computation tree logic","level":3,"score":0.3801000118255615},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.37790000438690186},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3384999930858612},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.33009999990463257},{"id":"https://openalex.org/C25016198","wikidata":"https://www.wikidata.org/wiki/Q781833","display_name":"Temporal logic","level":2,"score":0.314300000667572},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2847000062465668},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C3406870","wikidata":"https://www.wikidata.org/wiki/Q6044160","display_name":"Intelligent verification","level":5,"score":0.2524999976158142}],"mesh":[],"locations_count":1,"locations":[{"id":"pmh:oai:kar.kent.ac.uk:90814","is_oa":false,"landing_page_url":"https://kar.kent.ac.uk/90814/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or workshop item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4868030548095703,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"We":[0,22,33,44,77],"introduce":[1,45],"a":[2,46,79,99],"model":[3],"for":[4,83],"agent-environment":[5,87],"systems":[6,29,38],"where":[7],"the":[8,18,24,59,64,94,102],"agents":[9],"are":[10],"implemented":[11],"via":[12],"feed-forward":[13],"ReLU":[14],"neural":[15],"networks":[16],"and":[17,61,75,92],"environment":[19],"is":[20,42,72],"non-deterministic.":[21],"study":[23],"verification":[25,65,85],"problem":[26,66],"of":[27,49,86,101],"such":[28],"against":[30,39,67,98],"CTL":[31,71],"properties.":[32],"show":[34,51],"that":[35,63],"verifying":[36],"these":[37],"reachability":[40],"properties":[41],"undecidable.":[43],"bounded":[47,70],"fragment":[48],"CTL,":[50],"its":[52],"usefulness":[53],"in":[54,58,69,73],"identifying":[55],"shallow":[56],"bugs":[57],"system,":[60],"prove":[62],"specifications":[68],"coNEXPTIME":[74],"PSPACE-hard.":[76],"present":[78,89],"novel":[80],"parallel":[81],"algorithm":[82],"MILP-based":[84],"systems,":[88],"an":[90],"implementation,":[91],"report":[93],"experimental":[95],"results":[96],"obtained":[97],"variant":[100],"VerticalCAS":[103],"use-case.":[104]},"counts_by_year":[],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
